Search Results - (( media applications interface algorithm ) OR ( media applications path algorithm ))
Search alternatives:
- applications interface »
- media applications »
- applications path »
- path algorithm »
-
1
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…Apart from the positioning algorithm of this dissertation, there are several applications of this DSS to other areas including assistive technology for the blind and human-robot interaction. …”
Get full text
Get full text
Thesis -
2
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
3
AR technology-assisted selfie design and dissemination path analysis
Published 2023Get full text
Get full text
Article -
4
Suicide and self-harm prediction based on social media data using machine learning algorithms
Published 2023“…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
Get full text
Get full text
Get full text
Article -
5
-
6
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
7
-
8
-
9
How do mobile games connect us? a perspective on social media affordances
Published 2025“…The findings indicate that mobile games utilize interface interactions, platform algorithms, and voice media affordances to provide conditions for identity perception, relational connectivity, and contextual imagination, thereby facilitating social interactions. …”
Get full text
Get full text
Get full text
Article -
10
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
11
-
12
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
14
Steganography based on utilizing more surrounding pixels
Published 2010“…The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering more surrounding pixels in order to compute the best capacity value for each target pixel. …”
Get full text
Get full text
Thesis -
15
-
16
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
NFC secured online transaction in mobile computing business
Published 2012Get full text
Get full text
Get full text
Article -
18
-
19
Performance analysis of interface bonding and channel bonding at point to point wireless 802.11n
Published 2011“…However, a different result is obtained for the Interface Bonding, which is far from expectation. This is caused by Media Independent Interface (MII), and Scheduling Algorithm are unable to work properly at wireless 802.11n that is used in Point to Point connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
